Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Young-Jae Maeng is active.

Publication


Featured researches published by Young-Jae Maeng.


Ksii Transactions on Internet and Information Systems | 2009

Grid-Based Key Pre-Distribution in Wireless Sensor Networks

Abedelaziz Mohaisen; DaeHun Nyang; Young-Jae Maeng; Kyung-Hee Lee; Dowon Hong

In this paper, we introduce a grid-based key pre-distribution scheme in wireless sensor networks, which aims to improve the connectivity and resiliency while maintaining a reasonable overhead. We consider simplification of the key establishment logic and enhancement of the connectivity via plat polynomial assignment on a three-dimensional grid for node allocation and keying material assignment. We demonstrate that our scheme results in improvements via a detailed discussion on the connectivity, resource usage, security features and resiliency. A comparison with other relevant works from the literature along with a demonstrated implementation on typical sensor nodes shows the feasibility of the introduced scheme and its applicability for large networks.


Computers & Security | 2015

Transaction authentication using complementary colors

Young-Jae Maeng; Aziz Mohaisen; Mun-Kyu Lee; DaeHun Nyang

In this paper, we introduce a transaction authentication solution that provides compatibility with any banking transactions. Our solution is based on a novel visual cryptographic scheme that supports multiple uses of a single static share, unlike existing techniques in the literature of visual cryptography. To support multiple uses, we utilize complementary colors in the subtractive color mixing model. In our solution, a user is asked to overlap an issued visual cryptography card on an encrypted image that is rendered on a screen to check transaction information and transaction authentication number. We analyze the security of our scheme against various attacks and show its effectiveness using a usability study.


The Kips Transactions:partc | 2012

On Message Length Efficiency of Two Security Schemes using Bloom Filter

Young-Jae Maeng; Jeonil Kang; DaeHun Nyang; Kyung-Hee Lee

Recent two security schemes showed that a bloom filter can reduce a message length required for representing multiple MACs. The schemes, however, made message length comparison without considering security level. Since the MAC is intended for security, it is important to let multiple MACs and the bloom filter have the same level of security for making message length comparison. In this paper, we analyze the message length efficiency of bloom filter, compressed bloom filter and multiple MACs, letting them have the same security level.


The Kips Transactions:partc | 2008

Plat-Based Key Pre-Distribution Scheme in Sensor Network

Young-Jae Maeng; Abedelaziz Mohaisen; Kyung-Hee Lee; DaeHun Nyang

ABSTRACT The security of wireless sensor networks is a challenging research area where the resources constraints are a bottleneck for any successful security design. Due to their computational feasibility, symmetric key algorithms that require key pre-distribution are more desirable for use in these networks. In the pre-distribution scheme, keys or keying materials are assigned to each node prior deployment to guarantee a secure communication within the entire network. Though several works are introduced on this issue, yet the connectivity and resiliency are imperfectly handled. In this paper, we revisit the grid based key pre-distribution scheme aiming to improve the connectivity, introduce a higher resiliency level, simplify the logic of key establishment and maintain same level of used of resources usage. The core of our modification relies on introducing the novel plat-based polynomial assignment and key establishment mechanism. To demonstrate the advantageous properties of our scheme over the revisited one, details of consumed resources, resulting connectivity, security and comparisons with relevant works are introduced.Key Words:Sensor Network, Key Pre-Distribution, Plat-Based, 3D-Grid


The Kips Transactions:partc | 2007

Communication-Efficient Representations for Certificate Revocation in Wireless Sensor Network

Young-Jae Maeng; Abedelaziz Mohaisen; Kyung-Hee Lee; DaeHun Nyang

In this paper, we introduce a set of structures and algorithms for communication efficient public key revocation in wireless sensor networks. Unlike the traditional networks, wireless sensor network is subjected to resources constraints. Thus, traditional public key revocation mechanisms such like the ordinary certificate revocation list is unsuitable to be used. This unsuitability is due to the huge size of required representation space for the different keys` identifiers and the revocation communication as the set of revoked keys grow. In this work, we introduce two communication-efficient schemes for the certificate revocation. In the first scheme, we utilize the complete subtree mechanism for the identifiers representation which is widely used in the broadcast encryption/user revocation. In the second scheme, we introduce a novel bit vector representation BVS which uses vector of relative identifiers occurrence representation. We introduce different revocation policies and present corresponding modifications of our scheme. Finally, we show how the encoding could reduce the communication overhead as well. Simulation results and comparisons are provided to show the value of our work.


Archive | 2007

Method of providing completely automated public turing test to tell computer and human apart based on image

Dea-Hun Nyang; Jeonil Kang; Young-Jae Maeng; Koon-Soon Kim


Archive | 2007

SECRET USER SESSION MANAGING METHOD AND SYSTEM UNDER WEB ENVIRONMENT, RECORDING MEDIUM RECORDED PROGRAM EXECUTING IT

DaeHun Nyang; Young-Jae Maeng; Jeonil Kang


information security and cryptology | 2009

Cognitive Approach to Anti-Phishing and Anti-Pharming

Ju-Hyun Kim; Young-Jae Maeng; DaeHun Nyang; Kyung-Hee Lee


information security and cryptology | 2008

An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions

Young-Jae Maeng; DaeHun Nyang


Archive | 2013

Device for quantifying vulnerability of system and method therefor

Young-Jae Maeng; Jong-Hu Lee; Hyun-Dong Park; Sangwoo Park; Eungki Park

Collaboration


Dive into the Young-Jae Maeng's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dowon Hong

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Eungki Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyun-Dong Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jong-Hu Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge